Single branch specified, using that and the previous one: remotes/brancher/net-next-2025-04-25--06-00 (v6.15-rc3-661-g2b51ebc04ef8) remotes/brancher/net-next-2025-04-25--09-00 (v6.15-rc3-668-ge21ef41d425c) ==== BASE IDENTICAL ==== ==== COMMIT DIFF ==== diff --git a/tmp/tmp.DxLZDGZeIj b/tmp/tmp.J5EPsp9G40 index 55bd2ff3d302..3d9d53584179 100644 --- a/tmp/tmp.DxLZDGZeIj +++ b/tmp/tmp.J5EPsp9G40 @@ -6,6 +6,13 @@ selftests: net: enable profiling tc_action dbg profile patch forwarding: set timeout to 3 hours +net: call inet_twsk_put() on TIMEWAIT sockets It is possible for a pointer of type struct inet_timewait_sock to be returned from the functions __inet_lookup_established() and __inet6_lookup_established(). This can cause a crash when the returned pointer is of type struct inet_timewait_sock and sock_put() is called on it. The following is a crash call stack that shows sk->sk_wmem_alloc being accessed in sk_free() during the call to sock_put() on a struct inet_timewait_sock pointer. To avoid this issue, use inet_twsk_put() instead of sock_put() when sk->sk_state is TCP_TIME_WAIT. +net: libwx: fix to set pause param +selftests: net: add a virtio_net deadlock selftest +selftests: net: retry when bind returns EBUSY in xdp_helper +selftests: net: add flag to force zerocopy mode in xdp_helper +selftests: net: move xdp_helper to net/lib +rtase: Modify the format specifier in snprintf to %u net: lan743x: Fix memory leak when GSO enabled net: ethernet: mtk_eth_soc: sync mtk_clks_source_name array tools: ynl: allow fixed-header to be specified per op